Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:00
Static task
static1
Behavioral task
behavioral1
Sample
80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe
Resource
win10v2004-20241007-en
General
-
Target
80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe
-
Size
204KB
-
MD5
868582e6f68e39386be840e57a5487e0
-
SHA1
4ab211bab613c38767875fc969bb034d72f10a03
-
SHA256
80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4
-
SHA512
cfec054f165655e94c8e6bc4633bc9c58ae8bd8a93a02cf31014c82829688147ebed39c5f1052936a15fa0d666c4516c92eb3976f1402617d560d0f7af665b02
-
SSDEEP
3072:HFeODNAUrSqDMKKVILkt6i2ox7c39b1a0J86W8xXCKNWOHU/ezYMVWtG4SPUkxbu:HFeGpfMtboVBJtNWyPnYG4fUbu
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2460 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1644 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe 1644 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8849730a = "C:\\Windows\\apppatch\\svchost.exe" 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8849730a = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 12 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe File created C:\Windows\apppatch\svchost.exe 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2460 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1644 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2460 1644 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe 31 PID 1644 wrote to memory of 2460 1644 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe 31 PID 1644 wrote to memory of 2460 1644 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe 31 PID 1644 wrote to memory of 2460 1644 80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe"C:\Users\Admin\AppData\Local\Temp\80c912a1fa810ae218c565e963cfd6cbefd50ebbdab0fa8f9233a6fb84d4a8f4N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD54751aa54c12741dfa9f049988cb8f324
SHA1133f27081814143156be8e20d78eca606f6040be
SHA256fd0d82ad53b30a420076938d764ea3243c59784be70e5fa5b26e571991f7d6c0
SHA512c2d1aaca01c771e1934de3b32ea41ac68f62fbd577b974504638d0b3a44d42ab8df694f1390d698cc2bf674305fc78c3fda6d46d6743ddd8aaeac76dd0c1f695
-
Filesize
42KB
MD5576615e475c85110b9e4e2a9cc818647
SHA1994a81f8e71eced73d2077c4a72d6df2821a9b38
SHA256349ee498766846e5250fad2d701fafea290b831a6f571765c80503406ed6b04b
SHA5125696aea776610520f460d7a13e820ceaa1ed8e57398fef8a0845c09efd13ab41d8c0f062cb96c583ffae24c7570f32b56e65ea4986a504bcd146b4f7d52db5e7
-
Filesize
204KB
MD52321d4e2af0df0950fc8d945dbc4968b
SHA1490cfb8e13b7606e7ef2175d5213ba59707c7858
SHA256d21083443311a27cd68a767e0adb07eabfe3eaa413b6afffd44dc0cf78681dfe
SHA512bfc33a7391e993b3025313d8e22f0b4bbfce546189178121ef61f139a19a606abbb672cf2073417191b3349ff40340ba7ae15f48a71c68c49a6d75c7c59d156c